It was discovered that Ruby incorrectly handled certain files. An attacker could possibly use this issue to pass path matching what can lead to an unauthorized access. (CVE-2019-15845)
It was discovered that Ruby incorrectly handled certain regular expressions. An attacker could use this issue to cause a denial of service. (CVE-2019-16201)
It was discovered that Ruby incorrectly handled certain HTTP headers. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-16254)
It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-16255)
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "libruby2.3" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "libruby2.3-dbg" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "libruby2.3-dbgsym" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3-dbgsym" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3-dev" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3-dev-dbgsym" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3-doc" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3-tcltk" }, { "binary_version": "2.3.1-2~ubuntu16.04.14", "binary_name": "ruby2.3-tcltk-dbgsym" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "2.5.1-1ubuntu1.6", "binary_name": "libruby2.5" }, { "binary_version": "2.5.1-1ubuntu1.6", "binary_name": "libruby2.5-dbgsym" }, { "binary_version": "2.5.1-1ubuntu1.6", "binary_name": "ruby2.5" }, { "binary_version": "2.5.1-1ubuntu1.6", "binary_name": "ruby2.5-dbgsym" }, { "binary_version": "2.5.1-1ubuntu1.6", "binary_name": "ruby2.5-dev" }, { "binary_version": "2.5.1-1ubuntu1.6", "binary_name": "ruby2.5-doc" } ] }